cyber crime - what is it?

19
an Debjit

Upload: sovan-sinha

Post on 21-Mar-2017

39 views

Category:

Technology


0 download

TRANSCRIPT

PowerPoint Presentation

by Sovan and Debjit

The Internet World

Today, everything is on internet. From surfing social networks to buying goods through online shopping and also downloading and uploading files. But some experts are sitting in their homes and making the life for normal people miserable on internet by viruses.

Cyber extortion or Email ScamCyber extortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand money in return for promising to stop the attacks and to offer "protection". But that never happens!!!!

How computer is targeted?Crimes that primarily target computer networks or devices include:Computer virusesDenial-of-service attacksMalware (malicious code)

Cyber TerroristA cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching a computer-based attack against computers, networks, or the information stored on them.

Cyber WarThe U.S. Department of Defense (DoD) notes that the cyberspace has emerged as a national-level concern through several recent events of geo-strategic significance. Among those are included, the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers.

VirusViruses like Rootkits, Spyware, Trojans, etc. can cause a lot of loss for a huge company or a bank computer. Hackers create these viruses which are unable to detect and do damage to our computer slowly. It sends back confidential information to the hacker.

MalwareIt is a software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can get inside your computer while you are downloading from untrusted website.

Computer as a toolCrimes that use computer networks or devices to advance other ends include:Fraud and identity theft (although this increasingly uses malware, hacking and/or phishing, making it an example of both "computer as target" and "computer as tool" crime)Information warfarePhishing scamsSpamPropagation of illegal obscene or offensive content, including harassment and threats

The History

Phishing ScamPhishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by masquerading as a trust worthy entity in an e-mail.

Some devasting cases

December 2012 Wells Fargo website experienced a denial of service attack. Potentially compromising 70 million customers and 8.5 million active viewers. Other banks thought to be compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services

Combatting the CrimeDiffusion of the crime:- The broad diffusion of cybercriminal activities is an issue in computer crimes detection and prosecution. Indeed, hacking is much less complex than it was a few years ago, as hacking communities have greatly diffused their knowledge through the Internet. Blogs and communities have hugely contributed to information sharing: beginners could benefit from older hackers knowledge and advice.

Investigation:- A computer can be a source of evidence (see digital forensics). Even where a computer is not directly used for criminal purposes, it may contain records of value to criminal investigators in the form of a log file. In most countries[citation needed] Internet Service Providers are required, by law, to keep their logfiles for a predetermined amount of time.

However, some hackers have been hired as information security experts by private companies due to their inside knowledge of computer crime, a phenomenon which theoretically could create perverse incentives. A possible counter to this is for courts to ban convicted hackers from using the internet or computers, even after they have been released from prison though as computers and the internet become more and more central to everyday life, this type of punishment may be viewed as more and more harsh and draconian.

Antivirus ProtectionEmsisoft Anti MalwareNorton Internet SecurityMalwarebytes Anti MalawareQuick Heal Antivirus

These will protect you from being hacked or disturbed by some viruses in your computer.

Measures for cyber securityInstall a firewall:- Just as a real firewall keeps an inferno in one room from spreading to the rest of the building, a computer firewall blocks unwanted information and people from entering a computer system from the Internet.

Use a Web-filtering system:- These programs can block harmful sites as well as sites that may be inappropriate for viewing.

Thank YouBe SecureBe Safe